Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 1036

Shor's Algorithm

What is Shor's Algorithm?

Shor's AlgorithmA quantum algorithm that factors large integers and computes discrete logarithms in polynomial time, breaking RSA, Diffie-Hellman, and elliptic-curve cryptography on a sufficiently large quantum computer.


Shor's Algorithm, published by Peter Shor in 1994, solves the integer-factorization and discrete-logarithm problems in polynomial time on a fault-tolerant quantum computer. Those two problems underpin essentially every classical public-key system in production today: RSA, finite-field Diffie-Hellman, DSA, and ECDSA. While no current quantum hardware can factor cryptographically relevant key sizes, credible estimates suggest a few thousand stable logical qubits would suffice to break RSA-2048. This expectation is the root cause of the NIST PQC standardisation effort and of harvest-now-decrypt-later concerns, where adversaries record traffic today to decrypt it once Shor-capable machines exist.

Examples

  1. 01

    Used as the theoretical baseline for estimating quantum threat timelines against RSA-2048 and ECC P-256.

  2. 02

    Motivates migration from classical asymmetric primitives to lattice-based KEMs such as CRYSTALS-Kyber.

Frequently asked questions

What is Shor's Algorithm?

A quantum algorithm that factors large integers and computes discrete logarithms in polynomial time, breaking RSA, Diffie-Hellman, and elliptic-curve cryptography on a sufficiently large quantum computer. It belongs to the Cryptography category of cybersecurity.

What does Shor's Algorithm mean?

A quantum algorithm that factors large integers and computes discrete logarithms in polynomial time, breaking RSA, Diffie-Hellman, and elliptic-curve cryptography on a sufficiently large quantum computer.

How does Shor's Algorithm work?

Shor's Algorithm, published by Peter Shor in 1994, solves the integer-factorization and discrete-logarithm problems in polynomial time on a fault-tolerant quantum computer. Those two problems underpin essentially every classical public-key system in production today: RSA, finite-field Diffie-Hellman, DSA, and ECDSA. While no current quantum hardware can factor cryptographically relevant key sizes, credible estimates suggest a few thousand stable logical qubits would suffice to break RSA-2048. This expectation is the root cause of the NIST PQC standardisation effort and of harvest-now-decrypt-later concerns, where adversaries record traffic today to decrypt it once Shor-capable machines exist.

How do you defend against Shor's Algorithm?

Defences for Shor's Algorithm typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for Shor's Algorithm?

Common alternative names include: Shor factoring algorithm.

Related terms

See also